Disadvantages of Ict

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

DISADVANTAGES OF ICT

Be honest with yourself and share in class


the bad things or any unwarranted acts
(like piracy) you have done using ICT.

Why you did them?


Cybercrimes
- are illegal acts done through the
use of Internet.
Cybercrimes
1. Phishing/Spoofing
- the act of sending multiple
emails to multiple users in
hopes of having a number of
them clicking on the links or
malwares attached to the
email.
Cybercrimes
2. Blackmail/Extortion
- the act of using the Internet
to threaten or damage
someone’s reputation to extort
money or anything else of
value
Cybercrimes
3. Accessing Stored
Communications
- hacking; the act of
obtaining unauthorized
access to data from a
computer network.
Cybercrimes
4. Sports Betting
- the act of wagering
on any sports event
over the Internet.
Cybercrimes
5. Non-delivery of
Merchandise
- the act of devising a scheme
wherein a culprit posts an
item or service on sale on the
Internet and once transaction
has been done, does not
really give the item/service
Cybercrimes
6. Electronic Harassment
- the act of anonymously using the
Internet to harass, abuse, threaten
or annoy other people.
- an act of cyberbullying
Cybercrimes
7. Child Pornography
- an act of using the Internet
to show child pornography.
- this act is highly punishable
by law.
Cybercrimes
8. Prostitution
- the act of using the
Internet to engage
prostitution
Cybercrimes
9. Drug Trafficking
- the act of selling
illegal substance using
the Internet
Cybercrimes
10. Criminal Copyright
Infringement
- the act of piracy mainly
for financial gain.
Combatting Cybercrimes
1. Network Security
– before a hacker can get through
unauthorized files, the hacker has
to get through security measures
like firewalls, secure connections,
password, anti-malwares, and data
encryption.
Combatting Cybercrimes
2. Investigation
– URL tracing and logging are used
by websites to track your unique
IP addresses.
This can be used by investigators
to trace hackers. In piracy, trackers
are used to identify IP addresses
currently sharing a pirated file.
Combatting Cybercrimes
3. Penalties
- More and more laws are
being created and
implemented today.
- Penalties include both a
fine and imprisonment.
BLOG ACTIVITY
- Make a video blog post about everything you have
learned in ICT and its possible impact to our society
- Talk about its positive and negative impacts and
the youth’s role in helping promote its responsible
use.
- You can have an interview, debate, reenactment

You might also like